{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:46:57Z","timestamp":1767340017772,"version":"3.37.3"},"reference-count":32,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62171364","61941118"],"award-info":[{"award-number":["62171364","61941118"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Commun."],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1109\/tcomm.2023.3277538","type":"journal-article","created":{"date-parts":[[2023,5,18]],"date-time":"2023-05-18T17:20:07Z","timestamp":1684430407000},"page":"4620-4635","source":"Crossref","is-referenced-by-count":3,"title":["A Fully Bayesian Approach for Massive MIMO Unsourced Random Access"],"prefix":"10.1109","volume":"71","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8630-4758","authenticated-orcid":false,"given":"Jia-Cheng","family":"Jiang","sequence":"first","affiliation":[{"name":"School of Information and Communications Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4107-9512","authenticated-orcid":false,"given":"Hui-Ming","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Information and Communications Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China"}]}],"member":"263","reference":[{"key":"ref13","article-title":"Unsourced random access with coded compressed sensing: Integrating AMP and belief propagation","author":"amalladinne","year":"2020","journal-title":"arXiv 2010 04364"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/ICASSP40776.2020.9054142"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/ISIT.2019.8849802"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/JSAC.2020.3019722"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/TSP.2014.2386294"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/ISIT.2011.6033942"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/TIT.2020.3012948"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/ICC40277.2020.9148687"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/TIT.2016.2556702"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/JSAC.2016.2525418"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/JPROC.2016.2537298"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/TIT.2021.3081189"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/TIT.2017.2713833"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/SPAWC51858.2021.9593201"},{"key":"ref18","article-title":"Massive MIMO unsourced random access","author":"fengler","year":"2019","journal-title":"arXiv 1901 00828"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/TSP.2014.2357776"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/TWC.2014.2365813"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/TIT.2013.2269476"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/JSAC.2020.3036964"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/ISIT50566.2022.9834508"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/JSAC.2022.3145914"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/SPAWC51304.2022.9833940"},{"key":"ref28","first-page":"661","article-title":"Variational message passing","volume":"6","author":"winn","year":"2005","journal-title":"J Mach Learn Res"},{"year":"2006","author":"bishop","journal-title":"Pattern Recognition and Machine Learning","key":"ref27"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1073\/pnas.0909892106"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/ISIT.2017.8006984"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TWC.2021.3111104"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/TCOMM.2019.2940216"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/TCOMM.2018.2866559"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/MCOM.2016.7565189"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/TWC.2021.3060451"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TSP.2018.2818082"}],"container-title":["IEEE Transactions on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/26\/10219032\/10129201.pdf?arnumber=10129201","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T17:58:39Z","timestamp":1693850319000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10129201\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8]]},"references-count":32,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/tcomm.2023.3277538","relation":{},"ISSN":["0090-6778","1558-0857"],"issn-type":[{"type":"print","value":"0090-6778"},{"type":"electronic","value":"1558-0857"}],"subject":[],"published":{"date-parts":[[2023,8]]}}}